Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
2041
Data circulation security governance from the perspective of data socialization: a five-sphere framework
Published 2024-11-01“…The technology system provides secure technical capabilities for data circulation, the industry system fosters industrial ecosystems to promote cost reduction and efficiency improvement, the standards system reduces coordination difficulties by promoting standardization, the policy system constructs policy mechanisms to provide an innovative environment, and the practice system provides demonstration guidelines to promote application. …”
Get full text
Article -
2042
A Robust Enhanced Ensemble Learning Method for Breast Cancer Data Diagnosis on Imbalanced Data
Published 2024-01-01“…Addressing class imbalance in breast cancer data is essential for enhancing detection accuracy, yet traditional machine learning methods often overlook this imbalance, limiting their classification performance. …”
Get full text
Article -
2043
Smart tourism technologies and destination perception: implications for revisit intentions in mountainous destinations
Published 2025-03-01“…Additionally, this research examines the role of destination trust and perceived risk in the relationship between perceived destination image and revisit intention. Methodology - The data being utilized involved the accumulation of experience-based survey data from 200 respondents and experts, leading to the application of the partial least square structure equation modeling (PLS-SEM) approach. …”
Get full text
Article -
2044
AI-Enabled personalized learning ecology construction and its implications for prevocational education
Published 2025-01-01“…This paper discusses the construction of AI-enabled personalized learning ecology and its implications for pre-professional prospective education. …”
Get full text
Article -
2045
Research Trends in Eye Gaze Tracking and its Implications: A Bibliometric Analysis
Published 2025-05-01“…Introduction: Eye gaze tracking is essential in understanding non verbal communication, human-computer interaction and cognitive responses. Its applications range from healthcare to consumer behaviour analysis and gaming. …”
Get full text
Article -
2046
The Semantic Reference Data Modelling Method: Creating Understandable, Reusable and Sustainable Semantic Data Models
Published 2025-03-01“…A case study is used to illustrate the framework’s application in the cultural sector, specifically highlighting the advantages obtained in documentation, data consistency, and external data ingestion. …”
Get full text
Article -
2047
-
2048
GDMD: A Disaster Data Hub Fabric the Open Data Network for Disaster Risk Reduction
Published 2025-02-01“…The open model of GDMD can realize Findable, Accessible, Interoperable, and Reusable data governance in disaster risk reduction, further pushing the Open Science mechanism and innovative applications of resources.…”
Get full text
Article -
2049
-
2050
Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
Published 2015-12-01“…Through a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and sorting out the encrypted SSL flow, and then using the clustering method and the SVM based on mutual information classification method to further identify SSL encryption specific application, like HTTPS/POPS etc. …”
Get full text
Article -
2051
Utilization Patterns of the Cultural Centers Among the Youth in Tehran (Implications, Motivations and Functions)
Published 2015-03-01“…The main purpose of this study is to identify the application and implications of the Cultural Centers for the youth in Tehran and the motivations and functions resulting from the consumption of these spaces. …”
Get full text
Article -
2052
The Unit Price Implication of Reinforcement Usage in Tie Beam Reinforced Concrete Construction
Published 2018-04-01“…Thus, the use of the standard unit price analysis needs further assessment for proper application.…”
Get full text
Article -
2053
Advancements in digital twin technology and machine learning for energy systems: A comprehensive review of applications in smart grids, renewable energy, and electric vehicle optim...
Published 2024-10-01“…DT concepts facilitate the creation of virtual models mirroring physical assets, streamlining real-time data management and analysis. Driven by the potential of DTs to revolutionise energy systems, this paper offers a comprehensive review of DT applications in the power sector, specifically within next-generation energy systems like Smart Grids. …”
Get full text
Article -
2054
Data-Driven Uplift Modeling
Published 2025-01-01“…Usually, such studies are retrospective in nature rather than controlled experiments; hence, pre-existing bias in the observed data can distort the true effect of treatment. Previous studies on uplift modeling has largely overlooked this bias, focusing instead on model-based solutions for specific applications. …”
Get full text
Article -
2055
Reflections on data network technology
Published 2020-07-01“…The history of data network development and standardization was reviewed,and the idea ofsub-generational development concept for future network was put forward.It was pointed out that there were two technical routes in network design:the development technology route with users and business applications as the core,the gradual increase of network capabilities according to the needs of users and applications,and the development technology route with network as the core and the main body of capacity responsibility.Network 5.0 adopts “network as the core design concept”.A detailed description of three important capabilities of network 5.0 was given:endogenous credibility and security,endogenous network resource perception,deployment and control,and endogenous network certainty.…”
Get full text
Article -
2056
-
2057
-
2058
Instrumental temperature-dependence of backscatter measurements by a multibeam echosounder: findings and implications
Published 2025-05-01“…This pragmatic approach is demonstrated through its application to a short time series dataset, showcasing its benefits. …”
Get full text
Article -
2059
OPEN DATA: ANALYSIS OF TRENDS
Published 2018-05-01“…The analysis of the applicability of the world experience on data discovery for the Republic of Belarus was conducted, the topical issues of ensuring the proper level of information protection when publishing data sets were discussed, effective ways of using open data were suggested, and the importance of ensuring sufficient regulatory regulation was noted. …”
Get full text
Article -
2060
DRONES, PRIVACY AND DATA PROTECTION
Published 2021-05-01“…To identify the key issues, the paper will take into account major incidents that took place regarding breaches of data privacy, while also trying to distinguish how international law is applicable. …”
Get full text
Article